虫虫首页|资源下载|资源专辑|精品软件
登录|注册

remove

  • 很丰富的 Registry 改动例子

    很丰富的 Registry 改动例子,很多特别的例子 如: Change The Internet explorer Title, Showing the Windows Version on the Desktop remove the shortcut arrows from all your icons Creating 3D Window Effect To prevent any changes to the Start Menu Disable Registry Editing Tools

    标签: Registry

    上传时间: 2017-02-10

    上传用户:爺的气质

  • orumThemes.com - Breezet vBulletin Theme www.forumthemes.com ForumThemes.com would like to thank y

    orumThemes.com - Breezet vBulletin Theme www.forumthemes.com ForumThemes.com would like to thank you for purchasing one of our themes. If at anytime you have any problems with installation please visit our forums at www.forumthemes.com/forums. Included - Fluid XML files - Custom Java Script for drop downs (clientscript) (All it does is remove the little white arrows in the drop downs)

    标签: com ForumThemes forumthemes orumThemes

    上传时间: 2017-04-06

    上传用户:q123321

  • 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click

    1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.

    标签: SecurityBuilderDemo directory password located

    上传时间: 2014-01-23

    上传用户:chongcongying

  • CFE contains the following important features: * Easy to port to new SB1250/BCM1480 designs

    CFE contains the following important features: * Easy to port to new SB1250/BCM1480 designs * Initializes CPUs, caches, memory controllers, and peripherals * Built-in device drivers for SB1250 SOC peripherals * Several console choices, including serial ports, ROM emulators, JTAG, etc. * Environment storage in NV EEPROM, flash, etc. * Supports big or little endian operation * Supports 32-bit and 64-bit processors * Support for network bootstrap. Network protocols supported include IP,ARP,ICMP,UDP,DHCP,TFTP. * Support for disk bootstrap. * Provides an external API for boot loaders and startup programs * Simple user interface. UI is easy to remove for embedded apps.

    标签: following important contains features

    上传时间: 2014-11-22

    上传用户:龙飞艇

  • 卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

    卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    标签: 大学 数据

    上传时间: 2017-08-28

    上传用户:thinode

  • memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers.

    memcat - Copy the value of a key to standard output memflush - Flush the contents of your servers. memrm - remove a key(s) from the server. memstat - Dump the stats of your servers to standard output memslap - Load generation utility (benchmark!)

    标签: the contents memflush standard

    上传时间: 2014-11-27

    上传用户:zhuimenghuadie

  • it is a cleaner for windows msconfig when you disable an msconfig item it will still appear on th

    it is a cleaner for windows msconfig when you disable an msconfig item it will still appear on there. This programme let you remove disabled msconfig items

    标签: msconfig cleaner disable windows

    上传时间: 2013-12-23

    上传用户:恋天使569

  • Delphi 泛型容器 TDictionary 的用法 Demo

    Collection of key-value pairs.  TDictionary represents a generic collection of key-value pairs.  This class provides a mapping from a collection of keys to a collection of values. When you create a TDictionary object, you can specify various combinations of initial capacity, equality operation, and initial content.  You can add a key that is associated with a corresponding value with the Add or AddOrSetValue methods. You can remove entries with remove or Clear, which removes all key-value pairs. Adding or removing a key-value pair and looking up a key are efficient, close to O(1), because keys are hashed. A key must not be nil (though a value may be nil) and there must be an equality comparison operation for keys.  You can test for the presence or keys and values with the TryGetValue, ContainsKey and ContainsValue methods.  The Items property lists all Count dictionary entries. You can also set and get values by indexing the Items property. Setting the value this way overwrites any existing value.  The class TObjectDictionary inherits from TDictionary and provides an automatic mechanism for freeing objects removed from dictionary entries. 

    标签: Delphi 泛型

    上传时间: 2015-07-01

    上传用户:mirage

  • SDxCentral-Mega-NFV-Report

    The following sections profile many of the vendors in the NFV market. The individual profiles were created through a collaborative effort between SDNCentral’s Research Team and the Vendor’s product experts. SDNCentral worked under the assumption the information provided by the vendors was factual, auditing the submissions only to remove unverifiable claims and hyperbole. Extended profiles can be viewed online. While every attempt has been made to validate the capabilities listed in the profiles, SDNCentral advises end users to verify the veracity of each claim for themselves in their actual deployment environments. SDNCentral cannot be held liable for unexpected operations, damages or incorrect operation due to any inaccuracies listed here. SDNCentral welcomes feedback and additional information from end users based on their real-world experiences with the products and technologies listed. The SDNCentral research team can be reached at

    标签: SDxCentral-Mega-NFV-Report

    上传时间: 2020-05-31

    上传用户:shancjb

  • IGBT图解

    le flows through MOS channel while Ih flows across PNP transistor Ih= a/(1-a) le, IE-le+lh=1/(1-a)' le Since IGBT has a long base PNP, a is mainly determined by ar si0 2ar= 1/cosh(1/La), La: ambipolar diff length a-0.5 (typical value)p MOSFET channel current (saturation), le=U"Cox"W(2"Lch)"(Vc-Vth)le Thus, saturated collector current Ic, sat=1/(1-a)"le=-1/(1-a)"UCox"W/(2Lch)"(Vo-Vth)2Also, transconductance gm, gm= 1/(1-a)"u' Cox W/Lch*(Vo-Vth)Turn-On1. Inversion layer is formed when Vge>Vth2. Apply positive collector bias, +Vce3. Electrons flow from N+ emitter to N-drift layer providing the base current for the PNP transistor4. Since J1 is forward blased, hole carriers are injected from the collector (acts as an emitter).5. Injected hole carriers exceed the doping level of N-drift region (conductivity modulation). Turn-Off1. remove gate bias (discharge gate)2. Cut off electron current (base current, le, of pnp transistor)

    标签: igbt

    上传时间: 2022-06-19

    上传用户:wangshoupeng199